computer science essay

Countermeasures For Physical Security Issues Computer Science Essay

Published: 23, March 2015

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Internet security is something that includes ways to protect our information and data from unknown persons those who might attempt to access it without our permission and purposely accessed to destroy it, so the internet security is a place to ensure that our data and information are kept protected and safe. Those early days of the Internet, one of the most famous uses was electronic mail. Even though e-mail is popular those days, public have worried allot that a business competitor might catch e-mail messages for competitive gain. Another fear was that employees' non business connections might read their controller, in a negative way of effects. These were major and sensible problems. Today, the chances are much higher than earlier. The cost of a challenger having illegal right of entry to messages and important contents are now far more serious than in the past. Nowadays internet security can be reached by the use of antivirus software, which quarantines and totally keep away with malicious software. Firewalls can decide on which required sites can be viewed and it can block all the harmful contents.

The internet security issues have turn out to be a serious problem in today's world. These issues rose with the arrival of the internet. There are three basic internet security issues in this modern world:

Once an unknown individual reads or copies data or information, it is recognized as loss of secrecy. Once the data or information is customized / modified in an unbalanced way by an unknown person, it is recognized as loss of integrity. Once the data or information is removed / deleted or becomes unreachable by an unknown person, it is recognized as loss of necessity.

Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Logical security is protection of data or information in a nonphysical way. It includes only software wise safeguards for the organization such as password protection, user recognition, verification, authority levels plus access rights. These actions are to ensure that only allowed users are capable of performing actions and accessing data and information in an organization. If there are no proper logical security the threats can be uncovered when user enter weak passwords, and provide credit card numbers for distrusted online e-business websites also when the information between client and server is uncovered. This may lead to several problems for an organization for an example: when the information between user and organization is uncovered the hackers/competitors will get useful information, so the organization will get a bad name in society.

Countermeasures for logical security issues

A quality security policy should be implemented for e-commerce organization. The security policy should describe which assets to be protected and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not. Also it should primarily addresses physical and logical security.

Strong passwords should be used / Solid password protection software should be used.

Physical

Physical securities are the protections of private hardware which includes information or data of our own from physical circumstances and actions that could cause major losses or harms to an organization such as protecting from natural disasters, fire, robbery, theft, damage, and terror activities. This type of security issues are often noticed as important issues for an organization.

Security and warning arrangements can be put in place, like smoke detectors, heat sensors, intrusion detectors, cameras, and alarms.

Multiple recoveries for important data can be pace in different locations, so those can be recovered any time if any harm takes place for the organization.

Integrity

Integrity refers to preventing unauthorized data modification. These types of treats are modified without the user knowledge and less familiar to the public. For an example an e-mail message is interrupted and the contents are changed before it's forward to its original distribution so the end reader will think that's the exact message this is also called as man in the middle exploit. Most of these integrity threats attacks are exposed to client side area where the user known as the shopper in e-business.

Cookies are also called as browser cookies and tracking cookies. These are small frequently encrypted text files that are saved in browser directory. They are mostly used by web developers to help users find the way easily to their web pages efficiently and to carry out certain functions. Cookies also allow web servers to carry on ongoing open sessions with web clients. Open sessions are really important for plenty of things for online business activities, such as shopping cart and payment processing software they both need open sessions to work correctly.

Countermeasures

The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.

Use one of the third-party cookie blocking programs that prevent cookie storage selectively, like cookie blockers, Web Washer, Cookie Pal

Web bugs

Web bugs are also called as a web beacon. These are file objects or tiny graphics that are placed in websites and e-mail messages to monitor user behavior. Web bugs arrive as just a new GIF or another file object in the website. A Web bug is mostly applied by spammers to confirm e-mail address.

Active content

Active contents are objects on a website that are active, like Internet polls, opt-in features, animated GIFs, embedded objects and streaming video and audio. Active contents are used in electronic business to put things into a shopping cart and calculate the total amount, with sales tax, handling, and shipping cost.

Active contents can harm client computers, because the elements of active contents are programs that run on client side systems also it can create a threat in the client computers.

Active contents are in various types of forms, such as cookies, Java applets, JavaScript, VBScript, and ActiveX controls.

Java Applets

Java applets are applets distributed to the users in the structure of Java byte code. Java applets are written java programming language and can also be written in other computing languages to run in a web browser. These are mostly used to offer interactive texture and features to websites that cannot be provided by HTML alone. It is also possible for a Java applet to perform functions that would not be noticed by the site visitor.

Java can also run outside the confines of a Web browser. Java is platform independent; that is, it can run on many different computers, which means that security violations can occur. To counter this possibility, a security model called the Java sandbox has been developed. The Java sandbox confines Java applet actions to a set of rules defined by the security model. These rules apply to all untrusted Java applets. This prevents secrecy (disclosure) and integrity (deletion or modification) violations.

Java Script

Java scripts are developed by Netscape Inc.,it enables web site designers to construct active contents. Java script is a scripting language. These can be used for harms by executing code that destroys the client's hard drive. It also can get the URL's and information / data that are provided by users. This program can begin execution on its own.

Active X controls

A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. An ActiveX control is similar to a Java applet. ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. ActiveX controls are currently limited to Windows environments.

Graphics and plug-Ins

Graphics and plug-ins can harbor executable content. Some graphic file set-up has been created specially to include guidelines on how to deliver a graphic. These kinds of graphics can be a threat to the client's system. They are usually useful to perform tasks for a browser. Some of them are truly important for playing audio clips and video clips.

Viruses, Worms, and Antivirus software

A computer virus is a program file written intentionally. These types of viruses are attached into a commonly used program such as E-mail attachments and other downloadable links. When the program gets downloaded the virus program will also boot itself automatically into the clients system.

A computer worm is very similar to a virus. A worm can be a program that duplicate and harm the client side computers independently and travel across networks.

These types of dangerous programs can delete and destroy the whole computer data so nowadays its really important to use a good antivirus software to get rid of viruses and worms.

Stenography

Stenography is a effective method of hiding data or information inside another piece of information. These types of files are used mostly for malicious purposes in e-business.

In this process any outsiders can't read the casual contents only the sender and the intended recipient can read this type of information.

Active Wiretapping

Active Wiretapping exists when an illegal individual can alter a message stream of information. This activity can apply on unprotected dealings, like bank deposits, money transfer via internet. This activity is subject to integrity violations.

Cyber vandalism

Cyber vandalism is an electronic disfiguring of an existing web sites page. The hacker can create a untrue site that substitutes some ones fake IP address so that the user gets infected.

Security such as Tivoli secure way risk manager can defend this before any harm or damage is caused.

Spoofing

Spoofing is a way of attacking a computer system, here the program is created so as to show to be running normally while in truth it has been customized with the idea to avoid security mechanism like Phishing

Email spoofing is something when the senders modify the name in a friendly email so that it seems like the e-mail came from somebody else. This trap is normally used by spammers to stop public to find who they are. Presently there are no ways to avoid this nuisance.

Necessity

Necessity refers to preventing data delays or denials (removal)

Worms

A computer worm is very similar to a virus. A worm can be a program that duplicate and harm the client side computers independently and travel across networks.

Our experts can help you with your essay question

Writing Services

Essay Writing Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing Service

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.

Request Removal

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please click on the link below to request removal: